Searched refs:trusted (Results 1 – 25 of 34) sorted by relevance
12
/device/linaro/bootloader/arm-trusted-firmware/docs/ |
D | trusted-board-boot.rst | 23 A Chain of Trust (CoT) starts with a set of implicitly trusted components. On 27 trusted root-key storage registers. 57 the trusted key certificate. The public part is the ROTPK. 63 one of the extension fields in the trusted world certificate. 65 - **Non-trusted world key** 69 extension fields in the trusted world certificate. 96 public part of the trusted world key and the public part of the non-trusted 101 It is self-signed with the trusted world key. It contains the public part of 111 It is self-signed with the trusted world key. It contains the public part of 120 It is self-signed with the trusted world key. It contains the public part of [all …]
|
D | firmware-design.rst | 57 - Boot Loader stage 3-3 (BL33) *Non-trusted Firmware* 64 - Boot Loader stage 3-3 (BL33) *Non-trusted Firmware* 71 non-trusted SRAM, ROM and DRAM. 72 - Regions accessible from only the secure state. For example, trusted SRAM and 73 ROM. The FVPs also implement the trusted DRAM which is statically 90 The BL1 data section is copied to trusted SRAM at runtime. 94 to the top of trusted SRAM as defined by the constant ``BL1_RW_BASE``. 290 #. BL1 determines the amount of free trusted SRAM memory available by 292 trusted SRAM. BL1 loads a BL2 raw binary image from platform storage, at a 294 there is not enough free trusted SRAM the following error message is [all …]
|
D | rt-svc-writers-guide.rst | 18 Software executing in the normal world and in the trusted world at exception 211 state. SMC Calls can be made from both the normal and trusted worlds and
|
D | firmware-update.rst | 405 .. _Trusted Board Boot: ./trusted-board-boot.rst 407 .. _here: https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware-Image-Term…
|
D | change-log.rst | 904 determines the exception level to use for the non-trusted firmware (BL3-3) 906 provided to BL3-1). This allows platform code to directly run non-trusted 1191 NOTE: Generic BL2 code now loads a BL3-3 (non-trusted firmware) image into 1195 NOTE: Some non-trusted firmware (e.g. UEFI) will need to be rebuilt so that 1202 BL3-2 (if present) and BL3-3 (non-trusted firmware). 1378 .. _TF wiki on GitHub: https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmwa… 1382 .. _PR#1002: https://github.com/ARM-software/arm-trusted-firmware/pull/1002#issuecomment-312650193
|
/device/google/cuttlefish/host/frontend/gcastv2/webrtc/certs/ |
D | create_certs.sh | 19 rm trusted.pem 22 openssl x509 -in server.crt -text >> trusted.pem
|
/device/google/cuttlefish/host/frontend/gcastv2/https/certs/ |
D | create_certs.sh | 19 rm trusted.pem 22 openssl x509 -in server.crt -text >> trusted.pem
|
/device/linaro/bootloader/arm-trusted-firmware/make_helpers/tbbr/ |
D | tbbr_tools.mk | 46 $(eval $(call FIP_ADD_PAYLOAD,${TRUSTED_KEY_CERT},--trusted-key-cert)) 47 $(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_KEY_CERT},--trusted-key-cert)) 59 $(if ${TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${TRUSTED_WORLD_KEY},--trusted-world-key))) 60 $(if ${NON_TRUSTED_WORLD_KEY},$(eval $(call CERT_ADD_CMD_OPT,${NON_TRUSTED_WORLD_KEY},--non-trusted…
|
/device/linaro/bootloader/arm-trusted-firmware/ |
D | contributing.rst | 20 - `Fork`_ `arm-trusted-firmware`_ on GitHub. 22 - Create a local topic branch based on the `arm-trusted-firmware`_ ``master`` 45 `automatically closed`_ when merged into the `arm-trusted-firmware`_ ``master`` 86 - Submit a `pull request`_ to the `arm-trusted-firmware`_ ``integration`` branch. 117 .. _arm-trusted-firmware: https://github.com/ARM-software/arm-trusted-firmware
|
D | readme.rst | 212 .. _GitHub: https://www.github.com/ARM-software/arm-trusted-firmware 214 .. _Security Centre: https://github.com/ARM-software/arm-trusted-firmware/wiki/ARM-Trusted-Firmware…
|
/device/linaro/bootloader/arm-trusted-firmware/tools/fiptool/ |
D | fip_create.sh | 35 --trusted-key-cert FILENAME Trusted key certificate 78 --trusted-key-cert | \
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Lib/ |
D | rexec.py | 539 trusted = [] 544 trusted.append(a) 546 if trusted: 547 r.ok_builtin_modules = r.ok_builtin_modules + tuple(trusted)
|
/device/google/cuttlefish/host/frontend/gcastv2/webrtc/ |
D | Android.bp | 162 src: "certs/trusted.pem", 163 filename: "trusted.pem",
|
/device/google/contexthub/util/nanoapp_sign/ |
D | nanoapp_sign.c | 238 bool trusted = false; in handleVerify() local 272 trusted = true; in handleVerify() 281 if (trusted && !lastTrusted) { in handleVerify() 284 return trusted ? 0 : 2; in handleVerify()
|
/device/linaro/bootloader/arm-trusted-firmware/docs/plat/ |
D | hikey960.rst | 15 `link <https://github.com/ARM-software/arm-trusted-firmware>`__ 40 git clone https://github.com/ARM-software/arm-trusted-firmware -b integration 77 …${UEFI_TOOLS_DIR}/uefi-build.sh -b ${BUILD_OPTION} -a ../arm-trusted-firmware -s ../optee_os hikey…
|
D | hikey.rst | 15 `link <https://github.com/ARM-software/arm-trusted-firmware>`__ 43 git clone https://github.com/ARM-software/arm-trusted-firmware -b integration 86 … ${UEFI_TOOLS_DIR}/uefi-build.sh -b ${BUILD_OPTION} -a ../arm-trusted-firmware -s ../optee_os hikey
|
D | poplar.rst | 29 must happen prior invoking the arm trusted firmware: 40 `link <https://github.com/ARM-software/arm-trusted-firmware>`__
|
D | socionext-uniphier.rst | 119 .. _Trusted Board Boot: ../trusted-board-boot.rst
|
/device/linaro/hikey/uefi-tools/ |
D | edk2-build.sh | 196 if [ -z "$ATF_DIR" -a -d "$PWD"/arm-trusted-firmware ]; then 197 ATF_DIR="$PWD"/arm-trusted-firmware
|
D | platforms.config | 198 # https://github.com/ARM-software/arm-trusted-firmware
|
/device/mediatek/wembley-sepolicy/r_non_plat/ |
D | domain.te | 24 # Purpose: allow trusted process to connect aee daemon
|
/device/linaro/hikey/bootloader/ |
D | Makefile | 4 ATF_DIR=$(ANDROID_BUILD_TOP)/device/linaro/bootloader/arm-trusted-firmware
|
/device/google/cuttlefish/ |
D | host_package.mk | 115 trusted.pem \
|
/device/linaro/bootloader/arm-trusted-firmware/docs/spd/ |
D | tlk-dispatcher.rst | 27 free and open-source trusted execution environment (OTE).
|
/device/mediatek/wembley-sepolicy/non_plat/ |
D | domain.te | 24 # Purpose: allow trusted process to connect aee daemon
|
12